At the last PyCon, Brett Cannon told me that he had already implemented
the security architecture (or security template) for Python within
Firefox.  However, he did not go forward with the project because he
would not be able to get a PhD from doing it.  :-) 




Dennis Lee Bieber wrote:
> On Tue, 13 Nov 2007 09:51:49 -0000, bramble <[EMAIL PROTECTED]>
> declaimed the following in comp.lang.python:
>
>
>   
>> Why can't it be safely sandboxed?
>>
>> That is, why not just have a Python interpreter and some safe subset
>> of the Python standard library run with the browser? I mean, aside
>>     
>
>       It's not just the library (at a start you'd need to strip out
> modules os, popen, and subprocess), but you'd also need to block out
> exec, eval() (and by extension, input() ) from the interpreter core.
> Might need to do nasty things to the low-level import mechanism so that
> villains can't rig a web site to contain an import module with ability
> to access the local file system.
>   


-- 
Shane Geiger
IT Director
National Council on Economic Education
[EMAIL PROTECTED]  |  402-438-8958  |  http://www.ncee.net

Leading the Campaign for Economic and Financial Literacy

begin:vcard
fn:Shane Geiger
n:Geiger;Shane
org:National Council on Economic Education (NCEE)
adr:Suite 215;;201 N. 8th Street;Lincoln;NE;68508;United States
email;internet:[EMAIL PROTECTED]
title:IT Director
tel;work:402-438-8958
url:http://www.ncee.net
version:2.1
end:vcard

-- 
http://mail.python.org/mailman/listinfo/python-list

Reply via email to